Several local and remote vulnerabilities have been discovered in the Linux
kernel that may lead to a denial of service or the execution of arbitrary
code. The Common Vulnerabilities and Exposures project identifies the
following problems:

Ilja van Sprundel discovered that kernel memory could be leaked via the
Bluetooth setsockopt call due to an uninitialized stack buffer. This
could be used by local attackers to read the contents of sensitive kernel
memory.

Thomas Graf reported a typo in the DECnet protocol handler that could
be used by a local attacker to overrun an array via crafted packets,
potentially resulting in a Denial of Service (system crash).
A similar issue exists in the IPV4 protocol handler and will be fixed
in a subsequent update.

Florian Zumbiehl discovered a memory leak in the PPPOE subsystem caused
by releasing a socket before PPPIOCGCHAN is called upon it. This could
be used by a local user to DoS a system by consuming all available memory.

Alex Smith discovered an issue with the pwc driver for certain webcam
devices. If the device is removed while a userspace application has it
open, the driver will wait for userspace to close the device, resulting
in a blocked USB subsystem. This issue is of low security impact as
it requires the attacker to either have physical access to the system
or to convince a user with local access to remove the device on their
behalf.

Blake Frantz discovered that when a core file owned by a non-root user
exists, and a root-owned process dumps core over it, the core file
retains its original ownership. This could be used by a local user to
gain access to sensitive information.

Nick Piggin of SuSE discovered a number of issues in subsystems which
register a fault handler for memory mapped areas. This issue can be
exploited by local users to achieve a Denial of Service (DoS) and possibly
execute arbitrary code.

The following matrix lists additional packages that were rebuilt for
compatibility with or to take advantage of this update:

Debian 3.1 (sarge)

alsa-modules-i386

1.0.8+2sarge2

kernel-image-2.4.27-arm

2.4.27-2sarge6

kernel-image-2.4.27-m68k

2.4.27-3sarge6

kernel-image-speakup-i386

2.4.27-1.1sarge5

kernel-image-2.4.27-alpha

2.4.27-10sarge6

kernel-image-2.4.27-s390

2.4.27-2sarge6

kernel-image-2.4.27-sparc

2.4.27-9sarge6

kernel-image-2.4.27-i386

2.4.27-10sarge6

kernel-image-2.4.27-ia64

2.4.27-10sarge6

kernel-patch-2.4.27-mips

2.4.27-10.sarge4.040815-3

kernel-patch-powerpc-2.4.27

2.4.27-10sarge6

kernel-latest-2.4-alpha

101sarge3

kernel-latest-2.4-i386

101sarge2

kernel-latest-2.4-s390

2.4.27-1sarge2

kernel-latest-2.4-sparc

42sarge3

i2c

1:2.9.1-1sarge2

lm-sensors

1:2.9.1-1sarge4

mindi-kernel

2.4.27-2sarge5

pcmcia-modules-2.4.27-i386

3.2.5+2sarge2

hostap-modules-i386

1:0.3.7-1sarge3

systemimager

3.2.3-6sarge5

We recommend that you upgrade your kernel package immediately and reboot
the machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.